lst.h revision 1.10 1 1.10 agc /* $NetBSD: lst.h,v 1.10 2003/08/07 11:14:53 agc Exp $ */
2 1.5 christos
3 1.1 cgd /*
4 1.1 cgd * Copyright (c) 1988, 1989, 1990 The Regents of the University of California.
5 1.10 agc * All rights reserved.
6 1.10 agc *
7 1.10 agc * This code is derived from software contributed to Berkeley by
8 1.10 agc * Adam de Boor.
9 1.10 agc *
10 1.10 agc * Redistribution and use in source and binary forms, with or without
11 1.10 agc * modification, are permitted provided that the following conditions
12 1.10 agc * are met:
13 1.10 agc * 1. Redistributions of source code must retain the above copyright
14 1.10 agc * notice, this list of conditions and the following disclaimer.
15 1.10 agc * 2. Redistributions in binary form must reproduce the above copyright
16 1.10 agc * notice, this list of conditions and the following disclaimer in the
17 1.10 agc * documentation and/or other materials provided with the distribution.
18 1.10 agc * 3. Neither the name of the University nor the names of its contributors
19 1.10 agc * may be used to endorse or promote products derived from this software
20 1.10 agc * without specific prior written permission.
21 1.10 agc *
22 1.10 agc * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
23 1.10 agc * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
24 1.10 agc * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
25 1.10 agc * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
26 1.10 agc * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
27 1.10 agc * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
28 1.10 agc * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
29 1.10 agc * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
30 1.10 agc * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
31 1.10 agc * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
32 1.10 agc * SUCH DAMAGE.
33 1.10 agc *
34 1.10 agc * from: @(#)lst.h 8.1 (Berkeley) 6/6/93
35 1.10 agc */
36 1.10 agc
37 1.10 agc /*
38 1.1 cgd * Copyright (c) 1988, 1989 by Adam de Boor
39 1.1 cgd * Copyright (c) 1989 by Berkeley Softworks
40 1.1 cgd * All rights reserved.
41 1.1 cgd *
42 1.1 cgd * This code is derived from software contributed to Berkeley by
43 1.1 cgd * Adam de Boor.
44 1.1 cgd *
45 1.1 cgd * Redistribution and use in source and binary forms, with or without
46 1.1 cgd * modification, are permitted provided that the following conditions
47 1.1 cgd * are met:
48 1.1 cgd * 1. Redistributions of source code must retain the above copyright
49 1.1 cgd * notice, this list of conditions and the following disclaimer.
50 1.1 cgd * 2. Redistributions in binary form must reproduce the above copyright
51 1.1 cgd * notice, this list of conditions and the following disclaimer in the
52 1.1 cgd * documentation and/or other materials provided with the distribution.
53 1.1 cgd * 3. All advertising materials mentioning features or use of this software
54 1.1 cgd * must display the following acknowledgement:
55 1.1 cgd * This product includes software developed by the University of
56 1.1 cgd * California, Berkeley and its contributors.
57 1.1 cgd * 4. Neither the name of the University nor the names of its contributors
58 1.1 cgd * may be used to endorse or promote products derived from this software
59 1.1 cgd * without specific prior written permission.
60 1.1 cgd *
61 1.1 cgd * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
62 1.1 cgd * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
63 1.1 cgd * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
64 1.1 cgd * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
65 1.1 cgd * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
66 1.1 cgd * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
67 1.1 cgd * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
68 1.1 cgd * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
69 1.1 cgd * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
70 1.1 cgd * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
71 1.1 cgd * SUCH DAMAGE.
72 1.1 cgd *
73 1.7 christos * from: @(#)lst.h 8.1 (Berkeley) 6/6/93
74 1.1 cgd */
75 1.1 cgd
76 1.1 cgd /*-
77 1.1 cgd * lst.h --
78 1.1 cgd * Header for using the list library
79 1.1 cgd */
80 1.1 cgd #ifndef _LST_H_
81 1.1 cgd #define _LST_H_
82 1.1 cgd
83 1.6 christos #include <sys/param.h>
84 1.3 cgd #include <stdlib.h>
85 1.9 wiz
86 1.8 hubertf #include "sprite.h"
87 1.1 cgd
88 1.1 cgd /*
89 1.1 cgd * basic typedef. This is what the Lst_ functions handle
90 1.1 cgd */
91 1.1 cgd
92 1.1 cgd typedef struct Lst *Lst;
93 1.1 cgd typedef struct LstNode *LstNode;
94 1.1 cgd
95 1.1 cgd #define NILLST ((Lst) NIL)
96 1.1 cgd #define NILLNODE ((LstNode) NIL)
97 1.1 cgd
98 1.1 cgd /*
99 1.1 cgd * NOFREE can be used as the freeProc to Lst_Destroy when the elements are
100 1.1 cgd * not to be freed.
101 1.1 cgd * NOCOPY performs similarly when given as the copyProc to Lst_Duplicate.
102 1.1 cgd */
103 1.9 wiz #define NOFREE ((void (*)(ClientData)) 0)
104 1.9 wiz #define NOCOPY ((ClientData (*)(ClientData)) 0)
105 1.1 cgd
106 1.1 cgd #define LST_CONCNEW 0 /* create new LstNode's when using Lst_Concat */
107 1.1 cgd #define LST_CONCLINK 1 /* relink LstNode's when using Lst_Concat */
108 1.1 cgd
109 1.1 cgd /*
110 1.1 cgd * Creation/destruction functions
111 1.1 cgd */
112 1.4 jtc /* Create a new list */
113 1.9 wiz Lst Lst_Init(Boolean);
114 1.4 jtc /* Duplicate an existing list */
115 1.9 wiz Lst Lst_Duplicate(Lst, ClientData (*)(ClientData));
116 1.4 jtc /* Destroy an old one */
117 1.9 wiz void Lst_Destroy(Lst, void (*)(ClientData));
118 1.4 jtc /* True if list is empty */
119 1.9 wiz Boolean Lst_IsEmpty(Lst);
120 1.1 cgd
121 1.1 cgd /*
122 1.1 cgd * Functions to modify a list
123 1.1 cgd */
124 1.4 jtc /* Insert an element before another */
125 1.9 wiz ReturnStatus Lst_Insert(Lst, LstNode, ClientData);
126 1.4 jtc /* Insert an element after another */
127 1.9 wiz ReturnStatus Lst_Append(Lst, LstNode, ClientData);
128 1.4 jtc /* Place an element at the front of a lst. */
129 1.9 wiz ReturnStatus Lst_AtFront(Lst, ClientData);
130 1.4 jtc /* Place an element at the end of a lst. */
131 1.9 wiz ReturnStatus Lst_AtEnd(Lst, ClientData);
132 1.4 jtc /* Remove an element */
133 1.9 wiz ReturnStatus Lst_Remove(Lst, LstNode);
134 1.4 jtc /* Replace a node with a new value */
135 1.9 wiz ReturnStatus Lst_Replace(LstNode, ClientData);
136 1.4 jtc /* Concatenate two lists */
137 1.9 wiz ReturnStatus Lst_Concat(Lst, Lst, int);
138 1.1 cgd
139 1.1 cgd /*
140 1.1 cgd * Node-specific functions
141 1.1 cgd */
142 1.4 jtc /* Return first element in list */
143 1.9 wiz LstNode Lst_First(Lst);
144 1.4 jtc /* Return last element in list */
145 1.9 wiz LstNode Lst_Last(Lst);
146 1.4 jtc /* Return successor to given element */
147 1.9 wiz LstNode Lst_Succ(LstNode);
148 1.4 jtc /* Get datum from LstNode */
149 1.9 wiz ClientData Lst_Datum(LstNode);
150 1.1 cgd
151 1.1 cgd /*
152 1.1 cgd * Functions for entire lists
153 1.1 cgd */
154 1.4 jtc /* Find an element in a list */
155 1.9 wiz LstNode Lst_Find(Lst, ClientData, int (*)(ClientData, ClientData));
156 1.4 jtc /* Find an element starting from somewhere */
157 1.9 wiz LstNode Lst_FindFrom(Lst, LstNode, ClientData,
158 1.9 wiz int (*cProc)(ClientData, ClientData));
159 1.7 christos /*
160 1.4 jtc * See if the given datum is on the list. Returns the LstNode containing
161 1.4 jtc * the datum
162 1.4 jtc */
163 1.9 wiz LstNode Lst_Member(Lst, ClientData);
164 1.4 jtc /* Apply a function to all elements of a lst */
165 1.9 wiz void Lst_ForEach(Lst, int (*)(ClientData, ClientData), ClientData);
166 1.4 jtc /*
167 1.4 jtc * Apply a function to all elements of a lst starting from a certain point.
168 1.4 jtc * If the list is circular, the application will wrap around to the
169 1.4 jtc * beginning of the list again.
170 1.4 jtc */
171 1.9 wiz void Lst_ForEachFrom(Lst, LstNode, int (*)(ClientData, ClientData),
172 1.9 wiz ClientData);
173 1.1 cgd /*
174 1.1 cgd * these functions are for dealing with a list as a table, of sorts.
175 1.1 cgd * An idea of the "current element" is kept and used by all the functions
176 1.1 cgd * between Lst_Open() and Lst_Close().
177 1.1 cgd */
178 1.4 jtc /* Open the list */
179 1.9 wiz ReturnStatus Lst_Open(Lst);
180 1.4 jtc /* Next element please */
181 1.9 wiz LstNode Lst_Next(Lst);
182 1.4 jtc /* Done yet? */
183 1.9 wiz Boolean Lst_IsAtEnd(Lst);
184 1.4 jtc /* Finish table access */
185 1.9 wiz void Lst_Close(Lst);
186 1.1 cgd
187 1.1 cgd /*
188 1.1 cgd * for using the list as a queue
189 1.1 cgd */
190 1.4 jtc /* Place an element at tail of queue */
191 1.9 wiz ReturnStatus Lst_EnQueue(Lst, ClientData);
192 1.4 jtc /* Remove an element from head of queue */
193 1.9 wiz ClientData Lst_DeQueue(Lst);
194 1.1 cgd
195 1.4 jtc #endif /* _LST_H_ */
196